Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 6/2021

14-06-2021

A lightweight continuous authentication scheme for medical wireless body area networks

Authors: Tao Wan, Luyao Wang, Weichuan Liao, Shixin Yue

Published in: Peer-to-Peer Networking and Applications | Issue 6/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the development of the Internet of Things (IoT), mobile medical systems based on wireless body area networks (WBAN) have aroused extensive attention. Wearable wireless medical devices have emerged to meet the demand for high-quality medical services that brought great convenience to people’s lives. However, attackers pose a latent threat to users’ medical information privacy, and identity is easy to leak due to wireless networks’ openness. It can be seen that the authentication phase is a vital part. In this paper, we proposed a lightweight continuous authentication protocol in medical WBAN environments. Our protocol overcomes the shortcomings of sensor node impersonation attack by using physiological signals, cutting energy consumption by using lightweight technology, saving time and energy by reducing computation complexity, and ensuring the current sensor node is the original one through continuous authentication. Finally, our performance analysis has shown that our protocol is provided with the superiority of lightweight, mutuality, low cost. It has a considerable application prospect in medical WBAN.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Zimmerman TG (1996) Personal area networks: near-field intrabody communication. IBM Syst J 35(3.4):609–617CrossRef Zimmerman TG (1996) Personal area networks: near-field intrabody communication. IBM Syst J 35(3.4):609–617CrossRef
2.
go back to reference Latré B, Braem B, Moerman I, Blondia C, Demeester P (2011) A survey on wireless body area networks. Wirel Netw 17(1):1–18CrossRef Latré B, Braem B, Moerman I, Blondia C, Demeester P (2011) A survey on wireless body area networks. Wirel Netw 17(1):1–18CrossRef
3.
go back to reference Buduru AB, Yau SS (2015) A effective approach to continuous user authentication for touch screen smart devices. IEEE, pp 219–226 Buduru AB, Yau SS (2015) A effective approach to continuous user authentication for touch screen smart devices. IEEE, pp 219–226
4.
go back to reference Wayman J, Jain A, Maltoni D, Maio D (2005) An introduction to biometric authentication systems. Springer Wayman J, Jain A, Maltoni D, Maio D (2005) An introduction to biometric authentication systems. Springer
5.
go back to reference Traoré I, Woungang I, Nakkabi Y, Obaidat MS, Ahmed AAE, Khalilian B (2012) Dynamic sample size detection in learning command line sequence for continuous authentication. IEEE Trans Syst Man Cybern Part B 42(5):1343–1356CrossRef Traoré I, Woungang I, Nakkabi Y, Obaidat MS, Ahmed AAE, Khalilian B (2012) Dynamic sample size detection in learning command line sequence for continuous authentication. IEEE Trans Syst Man Cybern Part B 42(5):1343–1356CrossRef
6.
go back to reference Yeh KH, Su C, Chiu W, Zhou L (2018) I walk, therefore i am: continuous user authentication with plantar biometrics. IEEE Commun Mag 56(2):150–157CrossRef Yeh KH, Su C, Chiu W, Zhou L (2018) I walk, therefore i am: continuous user authentication with plantar biometrics. IEEE Commun Mag 56(2):150–157CrossRef
7.
go back to reference Chuang YH, Lo NW, Yang CY, Tang SW (2018) A lightweight continuous authentication protocol for the internet of things. Sensors 18(4):1104CrossRef Chuang YH, Lo NW, Yang CY, Tang SW (2018) A lightweight continuous authentication protocol for the internet of things. Sensors 18(4):1104CrossRef
8.
go back to reference Ramli SN, Ahmad R (2011) Surveying the wireless body area network in the realm of wireless communication. In: IAS. IEEE, pp 58–61 Ramli SN, Ahmad R (2011) Surveying the wireless body area network in the realm of wireless communication. In: IAS. IEEE, pp 58–61
9.
go back to reference Sanchez EM, Hernandez JF, Blasco JM, Hervé T, Micallef J, Grech I, Brincat A, Salcedo VT (2008) Body area network for wireless patient monitoring. IET Commun 2(2):215–222CrossRef Sanchez EM, Hernandez JF, Blasco JM, Hervé T, Micallef J, Grech I, Brincat A, Salcedo VT (2008) Body area network for wireless patient monitoring. IET Commun 2(2):215–222CrossRef
10.
go back to reference Seyedi M, Kibret B, Lai DTH, Faulkner M (2013) A survey on intrabody communications for body area network applications. IEEE Trans Biomed Eng 60(8):2067–2079CrossRef Seyedi M, Kibret B, Lai DTH, Faulkner M (2013) A survey on intrabody communications for body area network applications. IEEE Trans Biomed Eng 60(8):2067–2079CrossRef
11.
go back to reference Koya AM, Deepthi PP (2018) Anonymous hybrid mutual authentication and key agreement scheme for wireless body area network. Comput Netw 140:138–151CrossRef Koya AM, Deepthi PP (2018) Anonymous hybrid mutual authentication and key agreement scheme for wireless body area network. Comput Netw 140:138–151CrossRef
12.
go back to reference Li CT, Hwang MS (2010) An efficient biometrics-based remote user authentication scheme using smart cards. J Netw Comput Appl 33(1):1–5CrossRef Li CT, Hwang MS (2010) An efficient biometrics-based remote user authentication scheme using smart cards. J Netw Comput Appl 33(1):1–5CrossRef
13.
go back to reference Ramli SN, Ahmad R, Abdollah MF, Dutkiewicz E (2013) A biometric-based security for data authentication in wireless body area network (wban). In: 2013 15th International Conference on Advanced Communications Technology (ICACT). IEEE, pp 998–1001 Ramli SN, Ahmad R, Abdollah MF, Dutkiewicz E (2013) A biometric-based security for data authentication in wireless body area network (wban). In: 2013 15th International Conference on Advanced Communications Technology (ICACT). IEEE, pp 998–1001
14.
go back to reference Bhargav Spantzel A, Squicciarini AC, Modi SK, Young M, Bertino E, Elliott SJ (2007) Privacy preserving multi-factor authentication with biometrics. J Comput Secur 15(5):529–560CrossRef Bhargav Spantzel A, Squicciarini AC, Modi SK, Young M, Bertino E, Elliott SJ (2007) Privacy preserving multi-factor authentication with biometrics. J Comput Secur 15(5):529–560CrossRef
15.
go back to reference Ranganathan V, Rose SL (2019) Personal authentication mechanism based on finger knuckle print. J Med Syst 43(8):232CrossRef Ranganathan V, Rose SL (2019) Personal authentication mechanism based on finger knuckle print. J Med Syst 43(8):232CrossRef
16.
go back to reference He D, Kumar N, Chilamkurti N, Lee J-H (2014) Lightweight ecc based rfid authentication integrated with an id verifier transfer protocol. J Med Syst 38(10):116CrossRef He D, Kumar N, Chilamkurti N, Lee J-H (2014) Lightweight ecc based rfid authentication integrated with an id verifier transfer protocol. J Med Syst 38(10):116CrossRef
17.
go back to reference Lu Y, Li L, Peng H, Yang Y (2015) An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem. J Med Syst 39(3):32CrossRef Lu Y, Li L, Peng H, Yang Y (2015) An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem. J Med Syst 39(3):32CrossRef
18.
go back to reference Han L, Tan X, Wang S, Liang X (2018) An efficient and secure three-factor based authenticated key exchange scheme using elliptic curve cryptosystems. Peer-to-peer Netw Appl 11(1):63–73CrossRef Han L, Tan X, Wang S, Liang X (2018) An efficient and secure three-factor based authenticated key exchange scheme using elliptic curve cryptosystems. Peer-to-peer Netw Appl 11(1):63–73CrossRef
19.
go back to reference Hayajneh T, Mohd BJ, Imran M, Almashaqbeh G, Vasilakos AV (2016) Secure authentication for remote patient monitoring with wireless medical sensor networks. Sensors 16(4):424CrossRef Hayajneh T, Mohd BJ, Imran M, Almashaqbeh G, Vasilakos AV (2016) Secure authentication for remote patient monitoring with wireless medical sensor networks. Sensors 16(4):424CrossRef
20.
go back to reference Xu G, Qiu S, Ahmad H, Xu G, Guo Y, Zhang M, Xu H (2018) A multi-server two-factor authentication scheme with un-traceability using elliptic curve cryptography. Sensors 18(7):2394CrossRef Xu G, Qiu S, Ahmad H, Xu G, Guo Y, Zhang M, Xu H (2018) A multi-server two-factor authentication scheme with un-traceability using elliptic curve cryptography. Sensors 18(7):2394CrossRef
21.
go back to reference Dharminder, Mishra D, Li X (2020) Construction of rsa-based authentication scheme in authorized access to healthcare services - authorized access to healthcare services. J Med Syst 44(1):6CrossRef Dharminder, Mishra D, Li X (2020) Construction of rsa-based authentication scheme in authorized access to healthcare services - authorized access to healthcare services. J Med Syst 44(1):6CrossRef
22.
go back to reference Khemissa H, Tandjaoui D (2015) A lightweight authentication scheme for e-health applications in the context of internet of things. In: Al-Begain K, AlBeiruti N (eds) NGMAST. IEEE, pp 90–95 Khemissa H, Tandjaoui D (2015) A lightweight authentication scheme for e-health applications in the context of internet of things. In: Al-Begain K, AlBeiruti N (eds) NGMAST. IEEE, pp 90–95
23.
go back to reference Gope P, Hwang T (2016) A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Trans Ind Electron 63(11):7124–7132CrossRef Gope P, Hwang T (2016) A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Trans Ind Electron 63(11):7124–7132CrossRef
24.
go back to reference Adavoudi-Jolfaei A, Ashouri-Talouki M, Aghili SF (2019) Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks. Peer-to-Peer Netw Appl 12(1):43–59CrossRef Adavoudi-Jolfaei A, Ashouri-Talouki M, Aghili SF (2019) Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks. Peer-to-Peer Netw Appl 12(1):43–59CrossRef
25.
go back to reference Das AK, Wazid M, Kumar N, Khan MK, Choo K-KR, Park Y (2018) Design of secure and lightweight authentication protocol for wearable devices environment. IEEE J Biomed Health Inf 22 (4):1310–1322CrossRef Das AK, Wazid M, Kumar N, Khan MK, Choo K-KR, Park Y (2018) Design of secure and lightweight authentication protocol for wearable devices environment. IEEE J Biomed Health Inf 22 (4):1310–1322CrossRef
26.
go back to reference Dhillon PK, Kalra S (2017) A lightweight biometrics based remote user authentication scheme for iot services. J Inf Secur Appl 34:255–270 Dhillon PK, Kalra S (2017) A lightweight biometrics based remote user authentication scheme for iot services. J Inf Secur Appl 34:255–270
27.
go back to reference Xu L, Wu F (2019) A lightweight authentication scheme for multi-gateway wireless sensor networks under iot conception. Arab J Sci Eng 44(4):3977–3993CrossRef Xu L, Wu F (2019) A lightweight authentication scheme for multi-gateway wireless sensor networks under iot conception. Arab J Sci Eng 44(4):3977–3993CrossRef
28.
go back to reference Ostad Sharif A, Abbasinezhad Mood D, Nikooghadam M (2019) A robust and efficient ecc-based mutual authentication and session key generation scheme for healthcare applications. J Med Syst 43(1):10CrossRef Ostad Sharif A, Abbasinezhad Mood D, Nikooghadam M (2019) A robust and efficient ecc-based mutual authentication and session key generation scheme for healthcare applications. J Med Syst 43(1):10CrossRef
29.
go back to reference Yu S, Park K, Park Y, Kim H, Park Y (2020) A lightweight three-factor authentication protocol for digital rights management system. Peer-to-Peer Netw Appl:pp 1–17 Yu S, Park K, Park Y, Kim H, Park Y (2020) A lightweight three-factor authentication protocol for digital rights management system. Peer-to-Peer Netw Appl:pp 1–17
30.
go back to reference Frank M, Biedert R, Ma E, Martinovic I, Song D (2012) Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans Inf Forens Secur 8(1):136–148CrossRef Frank M, Biedert R, Ma E, Martinovic I, Song D (2012) Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans Inf Forens Secur 8(1):136–148CrossRef
31.
go back to reference Matsuyama Y, Shozawa M, Yokote R (2015) Brain signal’s low-frequency fits the continuous authentication. Neurocomputing 164:137–143CrossRef Matsuyama Y, Shozawa M, Yokote R (2015) Brain signal’s low-frequency fits the continuous authentication. Neurocomputing 164:137–143CrossRef
32.
go back to reference Mondal S, Bours P (2015) Continuous authentication and identification for mobile devices: Combining security and forensics. IEEE:1–6 Mondal S, Bours P (2015) Continuous authentication and identification for mobile devices: Combining security and forensics. IEEE:1–6
33.
go back to reference Peng G, Zhou G, Nguyen DT, Qi X, Yang Q, Wang S (2017) Continuous authentication with touch behavioral biometrics and voice on wearable glasses. IEEE Trans Hum-Mach Syst 47(3):404–416CrossRef Peng G, Zhou G, Nguyen DT, Qi X, Yang Q, Wang S (2017) Continuous authentication with touch behavioral biometrics and voice on wearable glasses. IEEE Trans Hum-Mach Syst 47(3):404–416CrossRef
34.
go back to reference Mosenia A, Sur-Kolay S, Raghunathan A, Jha NK (2016) Caba: Continuous authentication based on bioaura. IEEE Trans Comput 66(5):759–772MathSciNetCrossRef Mosenia A, Sur-Kolay S, Raghunathan A, Jha NK (2016) Caba: Continuous authentication based on bioaura. IEEE Trans Comput 66(5):759–772MathSciNetCrossRef
35.
go back to reference Alshehri A, Coenen F, Bollegala D (2018) Iterative keystroke continuous authentication: A time series based approach. KI-Künstliche Intell 32(4):231–243CrossRef Alshehri A, Coenen F, Bollegala D (2018) Iterative keystroke continuous authentication: A time series based approach. KI-Künstliche Intell 32(4):231–243CrossRef
36.
go back to reference Acar A, Aksu H, Uluagac AS, Akkaya K (2018) Waca: Wearable-assisted continuous authentication. IEEE, pp 264–269 Acar A, Aksu H, Uluagac AS, Akkaya K (2018) Waca: Wearable-assisted continuous authentication. IEEE, pp 264–269
37.
go back to reference Smith Creasey M, Rajarajan M (2019) A novel word-independent gesture-typing continuous authentication scheme for mobile devices. Comput Secur 83:140–150CrossRef Smith Creasey M, Rajarajan M (2019) A novel word-independent gesture-typing continuous authentication scheme for mobile devices. Comput Secur 83:140–150CrossRef
38.
go back to reference Burrows M, Abadi M, Needham RM (1989) A logic of authentication. Proc R Soc Lond Math Phys Sci 426(1871):233–271MathSciNetMATH Burrows M, Abadi M, Needham RM (1989) A logic of authentication. Proc R Soc Lond Math Phys Sci 426(1871):233–271MathSciNetMATH
39.
go back to reference Pereira GCCF, Alves RCA, da Silva FL, Azevedo RM, Albertini BC, Margi CB (2017) Performance evaluation of cryptographic algorithms over iot platforms and operating systems. Secur Commun Netw 2017:1–16CrossRef Pereira GCCF, Alves RCA, da Silva FL, Azevedo RM, Albertini BC, Margi CB (2017) Performance evaluation of cryptographic algorithms over iot platforms and operating systems. Secur Commun Netw 2017:1–16CrossRef
40.
go back to reference Yeh KH, Su C, Choo KKR, Chiu W (2017) A novel certificateless signature scheme for smart objects in the internet-of-things. Sensors 17(5):1001CrossRef Yeh KH, Su C, Choo KKR, Chiu W (2017) A novel certificateless signature scheme for smart objects in the internet-of-things. Sensors 17(5):1001CrossRef
41.
go back to reference Arshad H, Nikooghadam M (2016) An efficient and secure authentication and key agreement scheme for session initiation protocol using ecc. Multimed Tools Appl 75(1):181–197CrossRef Arshad H, Nikooghadam M (2016) An efficient and secure authentication and key agreement scheme for session initiation protocol using ecc. Multimed Tools Appl 75(1):181–197CrossRef
42.
go back to reference Li X, Ibrahim MH, Kumari S, Sangaiah AK, Gupta V, Choo K-KR (2017) Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Comput Netw 129:429–443CrossRef Li X, Ibrahim MH, Kumari S, Sangaiah AK, Gupta V, Choo K-KR (2017) Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Comput Netw 129:429–443CrossRef
Metadata
Title
A lightweight continuous authentication scheme for medical wireless body area networks
Authors
Tao Wan
Luyao Wang
Weichuan Liao
Shixin Yue
Publication date
14-06-2021
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 6/2021
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-021-01190-7

Other articles of this Issue 6/2021

Peer-to-Peer Networking and Applications 6/2021 Go to the issue

Premium Partner